17 ILMT 9.0 Performance tuning Scan groups - Introduction Scan group also called computer group is manageable unit that consists of computers Scan groups are created to simplify management of endpoints in IEM console Computers should be divided between different scan groups according to some well-defined rules Scan groups are very useful in solving performance problems, however if the whole ILMT environment does not exceed 35,000 endpoints, default scan group should be enough Scan groups might be created regardless of the size of an environment, however performance is the most common trigger of such action Some important indicators of need of scan groups are the time of ETL varies a lot from day to day the time of ETL is too long 17

18 ILMT 9.0 Performance tuning Scan groups - Distribution While creating scan groups, very important role plays appropriate distribution of the computers among scan groups. Some hints regarding this task: Agents should be evenly distributed between all scan groups however also amount of software installed on particular endpoint should be taken into account here Agents from different scan groups should send software scans on different days The rule of thumb is to create 7 scan groups (to have one load per day) and place all the endpoints inside those scan groups In large environments, one scan group should not exceed 20,000 endpoints 18

19 ILMT 9.0 Performance tuning Scan groups - Schedule After you the optimal size of the scan group is found, the scanning schedule should be set - the frequency of software scan on endpoints. The default value is once a week. Some hints regarding this task: The frequency of scans depends both on how often software products change on the endpoints reporting needs Systems that have dynamically-changing software, can be group together into a scan group (or groups) and set more frequent scans, for example once a week The remaining scan groups that contain computers with a more stable set of software can be scanned less frequently, for example once a month 19

21 ILMT 9.0 Performance tuning Scan groups - Example Example: Depends on the needs and the specification of monitored environment, the computers should be appropriately divided into scan groups for instance 70,000 computers might be divided in the following way among: 7 scan groups with about 10,000 endpoints in each This way software scan results from each group can be uploaded on different day of the week 6 scan groups with about 12,000 endpoints in each This way software scan results from each group mignt be uploaded on different day of the week and additionally we can use one day for different load/performance sensitive activity 21

22 Configuring ILMT and its database for medium and large environments 22

27 ILMT 9.0 Performance tuning Configuring transaction log Size The transaction logs size can be configured through the LOGFILSIZ DB2 parameter Procedure: Use the formula to calculate the disk space for transaction logs disk_space = <# of endpoints> x 1 MB + <# of endpoints for which new scan results are imported> x 1 MB + 1 GB Divide the result by to obtain the size of a single transaction log file log_space = disk_space / Run the command to update the transaction log size in your database UPDATE DATABASE CONFIGURATION FOR SUADB USING LOGFILSIZ log_space Example of transaction log for environment with 70k endpoints and 10k scans 27

32 ILMT 9.0 Performance tuning Increasing Java heap size Java heap size can be a bottle neck in some cases Increase the heap if ILMT environment consists of more 5k endpoints Procedure Go to the <INSTALL_DIR>/wlp/usr/servers/server1/ directory and edit the jvm.options file Set the maximum Java heap size (Xmx) to one of the following values, depending on the size of your environment: For medium environments ( endpoints), set the heap size to 6144m For large environments (over endpoints), set the heap size to 8192m Restart the IBM License Metric Tool server 32

33 ILMT 9.0 Performance tuning Increasing Java heap size Demo 33

34 Improving scrolling mechanism 34

35 ILMT 9.0 Performance tuning Improving scrolling mechanism When you open any report, 50 rows of data are loaded to the user interface by default When you scroll past those 50 rows, next 50 rows must be loaded To improve the response time of the user interface, you can increase the number of rows that are loaded to the user interface 35

36 ILMT 9.0 Performance tuning Improving scrolling mechanism Procedure: Stop the IBM License Metric Tool server On the computer where the ILMT server is installed go to this directory ILMT_installation_dir\...\javascripts\report_components, eg. /opt/ibm/lmt/wlp/usr/servers/server1/apps/tema.war/javascripts/report_components Open the grid.js file for editing and find the following lines: $.widget("bigfix.grid", {options: {pagesize: 50, gridoptions: {} } Increase the value of the pagesize parameter according to the size of your environment and save the change Start the ILMT server Clear the cache in the web browser 36

37 ILMT 9.0 Performance tuning Improving scrolling mechanism Demo 37

38 Additional considerations 38

39 Using relays 39

40 ILMT 9.0 Performance tuning Using relays To take advantage of the speed and scalability that is offered by IBM Endpoint Manager, it is often necessary to tune also the settings of the IEM deployment A relay is a client that is enhanced with a relay service Relays perform all client actions to protect the host computer, and in addition, deliver content and software downloads to child clients and other child relays Instead of requiring every networked computer to directly access the server, relays can be used to offload much of the burden Hundreds of clients can point to a relay for downloads, which in turn makes only a single request to the server Hints: Configure clients per relay Connect relays to other relays when available - parent child configuration 01.ibm.com/support/knowledgecenter/SSKLLW_9.1.0/com.ibm.tivoli.tem.doc_9.1/Platform/ Adm/c_using_relays.html%23c_using_relays 40

41 Recovering from accumulated scans 41

42 IBM License Metric Tool 9.0 Performance tuning 26th Questions & Answers Version ILMT 9.0 Performance tuning Recovering from accumulated scans There is possibility to recover from issue with many accumulated scans Three steps precede recovery process Backup of databases and accumulated scan files Deleting some data Verification Procedure: Back up BFEnterprise database SUADB database All files from the UploadManager/sha1 directory on the IBM Endpoint Manager server Delete All files from the UploadManager/sha1 directory on the IEM server Scan files entries from BFEnterprise database by running the following SQL query: use BFEnterprise delete from dbo.uploads where (FileName LIKE %itsitsearch% OR FileName LIKE %citsearch% ) delete from dbo.uploads_availability where (FileName LIKE %itsitsearch% OR FileName LIKE %citsearch% ) Verify Run data import task in ILMT Web UI 42

44 ILMT 9.0 Performance tuning Recovering from accumulated scans Summary If imports of data from IBM Endpoint Manager to ILMT are not running, the unprocessed scan data is accumulated on the IEM server. After turning on the ILMT server, a large amount of data has to be processed This leads to a long import time Preventive action Turn off scans if the IBM License Metric Tool server is to be unavailable for a few days due to routine maintenance or scheduled backups 44

45 REST API considerations 45

46 ILMT 9.0 Performance tuning REST API considerations You can use REST API for software licensing information to retrieve large amounts of data that is related to computer systems, software instances, and license usage in your environment Such information can be used for further processing and analysis Hints: The API requests should not be used together with other performance intensive tasks, like software scans or data imports Use the limit parameter to specify the number of retrieved results, eg. 70,000: https://hostname:port/api/sam/computer_systems?token=token&limit=70000 If you limit the first request to 70k results, append the next request with the offset=70,000 parameter to omit the records that you already retrieved: https://hostname:port/api/sam/computer_systems?token=token&limit=100000&offset=

Java 1.5 Plug-In Settings on Windows by Ben Patridge 4/17/06 1 Firstly, we want to verify how much memory you have in your system, so go to START SETTINGS CONTROL PANEL This screen will display under Computer

Stratusphere Solutions Deployment Best Practices Guide Introduction This guide has been authored by experts at Liquidware Labs in order to provide a baseline as well as recommendations for a best practices

Version: 1.5 2014 Page 1 of 5 1.0 Overview A backup policy is similar to an insurance policy it provides the last line of defense against data loss and is sometimes the only way to recover from a hardware

Rational Application Developer Performance Tips Introduction This article contains a series of hints and tips that you can use to improve the performance of the Rational Application Developer. This article

SQL Server Database Administrator s Guide Copyright 2011 Sophos Limited. All rights reserved. No part of this publication may be reproduced, stored in retrieval system, or transmitted, in any form or by

XpoLog Center Suite Data Sheet General XpoLog is a data analysis and management platform for Applications IT data. Business applications rely on a dynamic heterogeneous applications infrastructure, such

Pervasive PSQL Vx Server Licensing Overview The Pervasive PSQL Vx Server edition is designed for highly virtualized environments with support for enterprise hypervisor features including live application

Overview What is so cool about the SQL diagnostic manager Management Pack? The SQL diagnostic manager (SQLdm) Management Pack integrates key monitors and alerts used by SQL Server DBAs with Microsoft's

Tivoli Endpoint Manager for Remote Control Version 8 Release 2 User s Guide Tivoli Endpoint Manager for Remote Control Version 8 Release 2 User s Guide Note Before using this information and the product

System Administration of Windchill 10.2 Overview Course Code Course Length TRN-4340-T 3 Days In this course, you will gain an understanding of how to perform routine Windchill system administration tasks,

Running a Workflow on a PowerCenter Grid 2010-2014 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording or otherwise)

Course 6231A: Maintaining a Microsoft SQL Server 2008 Database About this Course Elements of this syllabus are subject to change. This five-day instructor-led course provides students with the knowledge

Microsoft SQL Server OLTP Best Practice The document Introduction to Transactional (OLTP) Load Testing for all Databases provides a general overview on the HammerDB OLTP workload and the document Microsoft

Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions

Kaspersky Security 9.0 for Microsoft SharePoint Server Administrator's Guide APPLICATION VERSION: 9.0 Dear User! Thank you for choosing our product. We hope that this document will help you in your work

BI on Cloud using SQL Server on IaaS Abstract Today s Business Intelligence (BI) Systems are analysing huge volumes of data, which is growing at a rapid pace requiring organizations to scale the hardware/infrastructure

IBM Security QRadar Vulnerability Manager Version 7.2.1 User Guide Note Before using this information and the product that it supports, read the information in Notices on page 61. Copyright IBM Corporation

TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS

Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation

Microsoft SQL Server Guide Best Practices and Backup Procedures Constellation HomeBuilder Systems Inc. This document is copyrighted and all rights are reserved. This document may not, in whole or in part,

This version of ITA Mail Archive is optimized to archive emails on both Microsoft Exchange 2000 and 2003 and 2007 servers. It is highly recommended that ITA Mail Archive should run on a server other than

System Requirements and Configuration Options Software: CrimeView Community, CrimeView Web System requirements and configurations are outlined below for CrimeView Web and CrimeView Community (including

Protect SQL Server 2012 AlwaysOn Availability Group with Hitachi Application Protector Tech Note Nathan Tran The purpose of this tech note is to show how organizations can use Hitachi Applications Protector

Virtual Managment Appliance Setup Guide 2 Sophos Installing a Virtual Appliance Installing a Virtual Appliance As an alternative to the hardware-based version of the Sophos Web Appliance, you can deploy